pull down to refresh
Further discussion / debunking can be found in this other post, here on SN:
Mass Exit Attacks on the Lightning Network [PDF]
#56189
http://arxiv.org/pdf/2208.01908
reply
pull down to refresh
Further discussion / debunking can be found in this other post, here on SN:
Mass Exit Attacks on the Lightning Network [PDF]
#56189
http://arxiv.org/pdf/2208.01908
Ok so I briefly read the paper. Had a few thoughts, wonder if anyone else in here is technical and could share other, related thoughts.
Here's my understanding of the two attacks described. The two attacks are independent of each other, but use related strategies:
And here are my thoughts:
Anyway that's my understanding of all this. Maybe I'm wrong and someone more well versed in these topics can comment